WO2011049711A3 - Resource access based on multiple credentials - Google Patents
Resource access based on multiple credentials Download PDFInfo
- Publication number
- WO2011049711A3 WO2011049711A3 PCT/US2010/050278 US2010050278W WO2011049711A3 WO 2011049711 A3 WO2011049711 A3 WO 2011049711A3 US 2010050278 W US2010050278 W US 2010050278W WO 2011049711 A3 WO2011049711 A3 WO 2011049711A3
- Authority
- WO
- WIPO (PCT)
- Prior art keywords
- resource
- user credentials
- resource access
- access based
- multiple credentials
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Ceased
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/10—Network architectures or network communication protocols for network security for controlling access to devices or network resources
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/40—User authentication by quorum, i.e. whereby two or more security principals are required
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/10—Network architectures or network communication protocols for network security for controlling access to devices or network resources
- H04L63/105—Multiple levels of security
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
- H04L63/0853—Network architectures or network communication protocols for network security for authentication of entities using an additional device, e.g. smartcard, SIM or a different communication terminal
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
- H04L63/0861—Network architectures or network communication protocols for network security for authentication of entities using biometrical features, e.g. fingerprint, retina-scan
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Hardware Design (AREA)
- General Engineering & Computer Science (AREA)
- Computing Systems (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Theoretical Computer Science (AREA)
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- Software Systems (AREA)
- Information Transfer Between Computers (AREA)
- Storage Device Security (AREA)
- Telephonic Communication Services (AREA)
- Mobile Radio Communication Systems (AREA)
- Management, Administration, Business Operations System, And Electronic Commerce (AREA)
Abstract
A collection of multiple user credentials each associated with one of multiple different users is obtained at a device, and one or more of the multiple user credentials are verified. The collection of multiple user credentials is also compared to a threshold combination of user credentials to be satisfied to access the resource, and a determination is made, based on the comparing and the verifying, as to whether access to the resource is permitted. An indication of whether access to the resource by a requesting user is permitted is returned or provided to another device.
Priority Applications (2)
| Application Number | Priority Date | Filing Date | Title |
|---|---|---|---|
| EP10825381.6A EP2491515A4 (en) | 2009-10-20 | 2010-09-24 | ACCESS TO RESOURCES BASED ON SEVERAL EVIDENCE OF IDENTITY |
| CN201080047318.5A CN102576399B (en) | 2009-10-20 | 2010-09-24 | Resource access based on multiple credentials |
Applications Claiming Priority (2)
| Application Number | Priority Date | Filing Date | Title |
|---|---|---|---|
| US12/582,185 | 2009-10-20 | ||
| US12/582,185 US8418237B2 (en) | 2009-10-20 | 2009-10-20 | Resource access based on multiple credentials |
Publications (2)
| Publication Number | Publication Date |
|---|---|
| WO2011049711A2 WO2011049711A2 (en) | 2011-04-28 |
| WO2011049711A3 true WO2011049711A3 (en) | 2011-08-04 |
Family
ID=43880293
Family Applications (1)
| Application Number | Title | Priority Date | Filing Date |
|---|---|---|---|
| PCT/US2010/050278 Ceased WO2011049711A2 (en) | 2009-10-20 | 2010-09-24 | Resource access based on multiple credentials |
Country Status (4)
| Country | Link |
|---|---|
| US (2) | US8418237B2 (en) |
| EP (1) | EP2491515A4 (en) |
| CN (1) | CN102576399B (en) |
| WO (1) | WO2011049711A2 (en) |
Families Citing this family (41)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| US8418237B2 (en) | 2009-10-20 | 2013-04-09 | Microsoft Corporation | Resource access based on multiple credentials |
| US9027092B2 (en) * | 2009-10-23 | 2015-05-05 | Novell, Inc. | Techniques for securing data access |
| WO2011085985A1 (en) * | 2010-01-13 | 2011-07-21 | Tyco Electronics Services Gmbh | Noise reduction in electronic device with touch sensitive surface |
| US8984621B2 (en) * | 2010-02-27 | 2015-03-17 | Novell, Inc. | Techniques for secure access management in virtual environments |
| US8528090B2 (en) * | 2010-07-02 | 2013-09-03 | Symantec Corporation | Systems and methods for creating customized confidence bands for use in malware detection |
| US12072989B2 (en) * | 2011-12-09 | 2024-08-27 | Sertainty Corporation | System and methods for using cipher objects to protect data |
| US20130160144A1 (en) * | 2011-12-14 | 2013-06-20 | Microsoft Corporation | Entity verification via third-party |
| US9258249B2 (en) | 2012-02-13 | 2016-02-09 | Microsoft Technology Licensing, Llc | Resource access throttling |
| US9600169B2 (en) * | 2012-02-27 | 2017-03-21 | Yahoo! Inc. | Customizable gestures for mobile devices |
| US20130254300A1 (en) * | 2012-03-22 | 2013-09-26 | Adam Berk | Computer-based Methods and Systems for Verifying User Affiliations for Private or White Label Services |
| US8863243B1 (en) * | 2012-04-11 | 2014-10-14 | Google Inc. | Location-based access control for portable electronic device |
| US20130305270A1 (en) * | 2012-05-08 | 2013-11-14 | Scooltv, Inc. | System and method for rating a media file |
| US9069932B2 (en) * | 2012-07-06 | 2015-06-30 | Blackberry Limited | User-rotatable three-dimensionally rendered object for unlocking a computing device |
| WO2014060920A1 (en) | 2012-10-17 | 2014-04-24 | Koninklijke Philips N.V. | Granting control of a shared system |
| CN108845668B (en) * | 2012-11-07 | 2022-06-03 | 北京三星通信技术研究有限公司 | Man-machine interaction system and method |
| SE536989C2 (en) * | 2013-01-22 | 2014-11-25 | Crunchfish Ab | Improved feedback in a seamless user interface |
| US8955070B2 (en) * | 2013-03-12 | 2015-02-10 | International Business Machines Corporation | Controlled password modification method and apparatus |
| US9742750B2 (en) * | 2013-06-12 | 2017-08-22 | Microsoft Technology Licensing, Llc | Roaming internet-accessible application state across trusted and untrusted platforms |
| US9411982B1 (en) * | 2013-08-07 | 2016-08-09 | Amazon Technologies, Inc. | Enabling transfer of digital assets |
| JP5892123B2 (en) * | 2013-08-20 | 2016-03-23 | 富士ゼロックス株式会社 | Information processing apparatus and information processing program |
| FR3020696B1 (en) * | 2014-04-30 | 2017-09-08 | Predicsis | METHOD AND DEVICE FOR AUTHENTICATING A USER TO ACCESS REMOTE RESOURCES |
| GB201409919D0 (en) * | 2014-06-04 | 2014-07-16 | Idscan Biometric Ltd | System, method and program for managing a repository of authenticated personal data |
| US9298899B1 (en) | 2014-09-11 | 2016-03-29 | Bank Of America Corporation | Continuous monitoring of access of computing resources |
| US9639687B2 (en) | 2014-11-18 | 2017-05-02 | Cloudfare, Inc. | Multiply-encrypting data requiring multiple keys for decryption |
| CN104573473B (en) | 2014-12-05 | 2018-02-02 | 小米科技有限责任公司 | A kind of method and authenticating device for unlocking administration authority |
| EP3668002B1 (en) * | 2014-12-19 | 2022-09-14 | Private Machines Inc. | Systems and methods for using extended hardware security modules |
| US20160366144A1 (en) * | 2015-06-10 | 2016-12-15 | Huawei Technologies Co., Ltd. | System Security Using Multi-user Control |
| US9942237B2 (en) | 2015-08-28 | 2018-04-10 | Bank Of America Corporation | Determining access requirements for online accounts based on characteristics of user devices |
| CN105426727B (en) * | 2015-12-17 | 2019-02-05 | Oppo广东移动通信有限公司 | Fingerprint decryption method and mobile terminal |
| GB2545894A (en) * | 2015-12-21 | 2017-07-05 | F Secure Corp | Network service abuse prevention |
| CN106997532B (en) * | 2016-01-22 | 2021-12-14 | 阿里巴巴集团控股有限公司 | Electronic certificate verification and cancellation method, system and server |
| GB201611948D0 (en) * | 2016-07-08 | 2016-08-24 | Kalypton Int Ltd | Distributed transcation processing and authentication system |
| US11343260B2 (en) * | 2018-03-01 | 2022-05-24 | Google Llc | Gradual credential disablement |
| CN108415388A (en) * | 2018-03-19 | 2018-08-17 | 深圳迈辽技术转移中心有限公司 | A kind of safety control system and method for controlling security |
| CN108415387A (en) * | 2018-03-19 | 2018-08-17 | 深圳迈辽技术转移中心有限公司 | A kind of safety control system and method for controlling security |
| KR102245382B1 (en) * | 2019-12-31 | 2021-04-28 | 주식회사 코인플러그 | Method for serving virtual common identifier based on blockchain network, and service providing server for using them |
| CN112511569B (en) * | 2021-02-07 | 2021-05-11 | 杭州筋斗腾云科技有限公司 | Method and system for processing network resource access request and computer equipment |
| CN112989380B (en) * | 2021-03-18 | 2025-01-28 | 深圳前海微众银行股份有限公司 | Resource exchange processing method, device, equipment and storage medium |
| US11921842B2 (en) * | 2021-06-14 | 2024-03-05 | Kyndryl, Inc. | Multifactor authorization on accessing hardware resources |
| US20240031368A1 (en) * | 2022-07-25 | 2024-01-25 | Okta, Inc. | Techniques for defending against authentication attacks using computational linguistics |
| US20250323916A1 (en) * | 2024-04-10 | 2025-10-16 | Sap Se | Secure exposure of access policies for protected resources |
Citations (4)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| US6263434B1 (en) * | 1999-09-21 | 2001-07-17 | Sun Microsystems, Inc. | Signed group criteria |
| US20020144149A1 (en) * | 2001-04-03 | 2002-10-03 | Sun Microsystems, Inc. | Trust ratings in group credentials |
| US20030140233A1 (en) * | 2002-01-22 | 2003-07-24 | Vipin Samar | Method and apparatus for facilitating low-cost and scalable digital identification authentication |
| US20060224590A1 (en) * | 2005-03-29 | 2006-10-05 | Boozer John F | Computer-implemented authorization systems and methods using associations |
Family Cites Families (16)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| US5745578A (en) * | 1996-06-17 | 1998-04-28 | Ericsson Inc. | Apparatus and method for secure communication based on channel characteristics |
| US6148401A (en) * | 1997-02-05 | 2000-11-14 | At&T Corp. | System and method for providing assurance to a host that a piece of software possesses a particular property |
| US6754820B1 (en) | 2001-01-30 | 2004-06-22 | Tecsec, Inc. | Multiple level access system |
| US6697947B1 (en) * | 1999-06-17 | 2004-02-24 | International Business Machines Corporation | Biometric based multi-party authentication |
| US6609198B1 (en) | 1999-08-05 | 2003-08-19 | Sun Microsystems, Inc. | Log-on service providing credential level change without loss of session continuity |
| US7039812B2 (en) | 2000-01-26 | 2006-05-02 | Citicorp Development Center, Inc. | System and method for user authentication |
| US7565326B2 (en) | 2000-05-25 | 2009-07-21 | Randle William M | Dialect independent multi-dimensional integrator using a normalized language platform and secure controlled access |
| US7107610B2 (en) * | 2001-05-11 | 2006-09-12 | Intel Corporation | Resource authorization |
| US7496952B2 (en) | 2002-03-28 | 2009-02-24 | International Business Machines Corporation | Methods for authenticating a user's credentials against multiple sets of credentials |
| JP2006527890A (en) * | 2003-06-16 | 2006-12-07 | ユーアールユー テクノロジー インコーポレイテッド | Method and system for constructing and processing a multi-purpose proof management device effective for biometrics |
| WO2005107137A2 (en) | 2004-04-23 | 2005-11-10 | Passmark Security, Inc. | Method and apparatus for authenticating users using two or more factors |
| US7194763B2 (en) * | 2004-08-02 | 2007-03-20 | Cisco Technology, Inc. | Method and apparatus for determining authentication capabilities |
| EP1811412A1 (en) * | 2005-08-04 | 2007-07-25 | Intelligent Wave Inc. | Computer control method using externally connected device and computer control system |
| US9118656B2 (en) | 2006-01-26 | 2015-08-25 | Imprivata, Inc. | Systems and methods for multi-factor authentication |
| US8438617B2 (en) * | 2007-10-29 | 2013-05-07 | Emc Corporation | User authentication based on voucher codes |
| US8418237B2 (en) | 2009-10-20 | 2013-04-09 | Microsoft Corporation | Resource access based on multiple credentials |
-
2009
- 2009-10-20 US US12/582,185 patent/US8418237B2/en not_active Expired - Fee Related
-
2010
- 2010-09-24 WO PCT/US2010/050278 patent/WO2011049711A2/en not_active Ceased
- 2010-09-24 EP EP10825381.6A patent/EP2491515A4/en not_active Ceased
- 2010-09-24 CN CN201080047318.5A patent/CN102576399B/en not_active Expired - Fee Related
-
2013
- 2013-03-15 US US13/836,231 patent/US8904509B2/en active Active
Patent Citations (4)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| US6263434B1 (en) * | 1999-09-21 | 2001-07-17 | Sun Microsystems, Inc. | Signed group criteria |
| US20020144149A1 (en) * | 2001-04-03 | 2002-10-03 | Sun Microsystems, Inc. | Trust ratings in group credentials |
| US20030140233A1 (en) * | 2002-01-22 | 2003-07-24 | Vipin Samar | Method and apparatus for facilitating low-cost and scalable digital identification authentication |
| US20060224590A1 (en) * | 2005-03-29 | 2006-10-05 | Boozer John F | Computer-implemented authorization systems and methods using associations |
Also Published As
| Publication number | Publication date |
|---|---|
| CN102576399B (en) | 2015-05-13 |
| WO2011049711A2 (en) | 2011-04-28 |
| EP2491515A4 (en) | 2014-12-03 |
| US8904509B2 (en) | 2014-12-02 |
| EP2491515A2 (en) | 2012-08-29 |
| CN102576399A (en) | 2012-07-11 |
| US20110093939A1 (en) | 2011-04-21 |
| US8418237B2 (en) | 2013-04-09 |
| US20130205382A1 (en) | 2013-08-08 |
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| WO2011049711A3 (en) | Resource access based on multiple credentials | |
| WO2013055970A3 (en) | Authenticating device users | |
| WO2013003265A3 (en) | Persistent key access to a resources in a collection | |
| WO2010019353A3 (en) | Portable device association | |
| WO2014066619A3 (en) | Combining measurements based on beacon data | |
| WO2012173835A3 (en) | Client-side modification of search results based on social network data | |
| WO2014004810A3 (en) | Inbox management | |
| WO2010019370A3 (en) | Protocol for device to station association | |
| MX2015005983A (en) | Predicted-location notification. | |
| WO2012112944A3 (en) | Managing unwanted communications using template generation and fingerprint comparison features | |
| WO2010148035A3 (en) | Resource management for a wireless device | |
| WO2015006581A3 (en) | Providing history-based data processing | |
| WO2013101894A3 (en) | Secure user authentication for bluetooth enabled computer storage devices | |
| WO2013148801A3 (en) | Sending recommendation information associated with a business object | |
| WO2009102915A3 (en) | Systems and methods for secure handling of secure attention sequences | |
| MX345061B (en) | Method, one or more computer-readable non-transitory storage media and a device, in particular relating to computing resources and/or mobile-device-based trust computing. | |
| WO2012178019A3 (en) | Multi-level, hash-based device integrity checks | |
| WO2007115209A3 (en) | Identity and access management framework | |
| WO2014078668A3 (en) | Evaluating electronic network devices in view of cost and service level considerations | |
| WO2012015698A8 (en) | Interference coordination for peer-to-peer (p2p) communication and wide area network (wan) communication | |
| WO2012044588A3 (en) | Image-based key exchange | |
| WO2015034902A3 (en) | Determining transmit power based on categorization of access terminals | |
| WO2013112869A3 (en) | Methods for indicating backhaul relay geometry | |
| WO2014066440A3 (en) | Obtaining event reviews | |
| WO2006076382A3 (en) | Method and apparatus providing policy-based revocation of network security credentials |
Legal Events
| Date | Code | Title | Description |
|---|---|---|---|
| WWE | Wipo information: entry into national phase |
Ref document number: 201080047318.5 Country of ref document: CN |
|
| 121 | Ep: the epo has been informed by wipo that ep was designated in this application |
Ref document number: 10825381 Country of ref document: EP Kind code of ref document: A1 |
|
| WWE | Wipo information: entry into national phase |
Ref document number: 2010825381 Country of ref document: EP |
|
| WWE | Wipo information: entry into national phase |
Ref document number: 2991/CHENP/2012 Country of ref document: IN |
|
| NENP | Non-entry into the national phase |
Ref country code: DE |